An Efficient Verifiable Threshold Multi-Secret Sharing Scheme with Different Stages

27Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography. A single secret sharing scheme has low efficiency and multiple secret sharing schemes can greatly improve the efficiency of secret sharing. We present an efficient verifiable threshold multi-secret sharing scheme with different stages in which multiple secrets are shared among participants during one sharing process. In such a way, some qualified subsets of participants can collectively recover these secrets. The verifiable nature means that the participant can verify his/her own share. Our proposed scheme can share multiple secrets and each secret has its own threshold access structure. Moreover, each participant only keeps one share, and however they can reconstruct all secrets in recovery stages. This scheme is a multi-stage-use secret sharing scheme, in which the size of the participant's share is the same as that of each secret and the amount of information disclosed reaches the optimal lower bound. Compared with the previous verifiable (t,n)-threshold multi-secret sharing scheme, this scheme is of stronger computational security and practicability.

Cite

CITATION STYLE

APA

Chen, D., Lu, W., Xing, W., & Wang, N. (2019). An Efficient Verifiable Threshold Multi-Secret Sharing Scheme with Different Stages. IEEE Access, 7, 107104–107110. https://doi.org/10.1109/ACCESS.2019.2929090

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free